Sciweavers

3274 search results - page 100 / 655
» Access Support in Object Bases
Sort
View
117
Voted
USENIX
1996
15 years 4 months ago
A Hierarchical Internet Object Cache
: This paper discussesthedesignandperformance of a hierarchical proxy-cache designed to make Internet information systems scale better. The design was motivated by our earlier trac...
Anawat Chankhunthod, Peter B. Danzig, Chuck Neerda...
149
Voted
PERCOM
2003
ACM
16 years 3 months ago
BASE - A Micro-Broker-Based Middleware for Pervasive Computing
Pervasive computing environments add a multitude of additional devices to our current computing landscapes. Specialized embedded systems provide sensor information about the real ...
Christian Becker, Gregor Schiele, Holger Gubbels, ...
PERCOM
2005
ACM
16 years 3 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
TISSEC
2010
121views more  TISSEC 2010»
15 years 1 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
152
Voted
JCM
2007
103views more  JCM 2007»
15 years 3 months ago
Seamless Handover For Unidirectional Broadcast Access Networks In Mobile IPv6
Mechanisms and protocol interactions for seamless handover of mobile multicast/broadcast services using unidirectional access networks in heterogeneous Mobile IP infrastructures ar...
Ilka Miloucheva, Jens Mödeker, Karl Jonas, Di...